TY - JOUR
T1 - Thwarting ICMP low-rate attacks against firewalls while minimizing legitimate traffic loss
AU - Hayawi, Kadhim
AU - Trabelsi, Zouheir
AU - Zeidan, Safaa
AU - Masud, Mohammad Mehedy
N1 - Funding Information:
This work was supported by the UAE University UPAR Research Grant Program under Grant 31T122.
Publisher Copyright:
© 2013 IEEE.
PY - 2020
Y1 - 2020
N2 - Low-rate distributed denial of service (LDDoS) attacks pose more challenging threats that disrupt network security devices and services. Such type of attacks is difficult to detect and mitigate. In LDDoS attacks, attacker uses low-volume of malicious traffic that looks alike legitimate traffic. Thus, it can enter the network in silence without any notice. However, it may have severe effect on disrupting network services, depleting system resources, and degrading network speed to a point considering them as one of the most damaging attack types. There are many types of LDDoS such as application server and ICMP error messages based LDDoS. This paper is solely concerned with the ICMP error messages based LDDoS. The paper proposes a mechanism to mitigate low-rate ICMP error message attacks targeting security devices, such as firewalls. The mechanism is based on triggering a rejection rule to defend against corresponding detected attack as early as possible, in order to preserve firewall resources. The rejection rule has certain adaptive activity time, during which the rule continues to reject related low-rate attack packets. This activity time is dynamically predicted for the next rule activation period according to current and previous attack severity and statistical parameters. However, the rule activity time needs to be stabilized in a manner in order to prevent any additional overhead to the system as well as to prevent incremental loss of corresponding legitimate packets. Experimental results demonstrate that the proposed mechanism can efficiently defend against incremental evasion cycle of low-rate attacks, and monitor rejection rule activity duration to minimize legitimate traffic loss.
AB - Low-rate distributed denial of service (LDDoS) attacks pose more challenging threats that disrupt network security devices and services. Such type of attacks is difficult to detect and mitigate. In LDDoS attacks, attacker uses low-volume of malicious traffic that looks alike legitimate traffic. Thus, it can enter the network in silence without any notice. However, it may have severe effect on disrupting network services, depleting system resources, and degrading network speed to a point considering them as one of the most damaging attack types. There are many types of LDDoS such as application server and ICMP error messages based LDDoS. This paper is solely concerned with the ICMP error messages based LDDoS. The paper proposes a mechanism to mitigate low-rate ICMP error message attacks targeting security devices, such as firewalls. The mechanism is based on triggering a rejection rule to defend against corresponding detected attack as early as possible, in order to preserve firewall resources. The rejection rule has certain adaptive activity time, during which the rule continues to reject related low-rate attack packets. This activity time is dynamically predicted for the next rule activation period according to current and previous attack severity and statistical parameters. However, the rule activity time needs to be stabilized in a manner in order to prevent any additional overhead to the system as well as to prevent incremental loss of corresponding legitimate packets. Experimental results demonstrate that the proposed mechanism can efficiently defend against incremental evasion cycle of low-rate attacks, and monitor rejection rule activity duration to minimize legitimate traffic loss.
KW - BlackNurse attack
KW - Low-rate attacks
KW - Stateful firewall
KW - attack probabilistic modeling
KW - session table
UR - http://www.scopus.com/inward/record.url?scp=85084845720&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=85084845720&partnerID=8YFLogxK
U2 - 10.1109/ACCESS.2020.2987479
DO - 10.1109/ACCESS.2020.2987479
M3 - Article
AN - SCOPUS:85084845720
SN - 2169-3536
VL - 8
SP - 78029
EP - 78043
JO - IEEE Access
JF - IEEE Access
M1 - 9064541
ER -